Passive and active measurement : 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings /: 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings. (2020)
- Record Type:
- Book
- Title:
- Passive and active measurement : 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings /: 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings. (2020)
- Main Title:
- Passive and active measurement : 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings
- Other Titles:
- PAM 2020
- Further Information:
- Note: Anna Sperotto, Alberto Dainotti, Burkhard Stiller (eds.).
- Other Names:
- Sperotto, Anna
Dainotti, Alberto
Stiller, Burkhard, 1965-
PAM (Conference), 21st - Contents:
- Intro -- Preface -- Organization -- Contents -- Active Measurement -- Discovering the IPv6 Network Periphery -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 Edgy -- 3.2 Edgy Input -- 3.3 Limitations -- 3.4 Probing -- 4 Results -- 4.1 BGP-Informed Seed Results -- 4.2 Hitlist-Informed Seed Results -- 4.3 Edginess Metrics -- 4.4 Consolidated Results and Seed Data Comparison -- 4.5 EUI-64 Addresses -- 4.6 Comparison to the IPv6 Hitlist Service -- 4.7 Comparison with CAIDA IPv6 Topology Mapping -- 4.8 Comparison with Seed Data Source -- 5 Conclusions and Future Work B Block Usage Change -- C Comparing Trinocular and FBS -- References -- FLOWTRACE: A Framework for Active Bandwidth Measurements Using In-band Packet Trains -- 1 Introduction -- 2 Background -- 3 FLOWTRACE -- 3.1 Overview -- 3.2 Technical Challenges -- 3.3 Implementation -- 4 Evaluation -- 4.1 Minimal Cross Traffic -- 4.2 With Cross-Traffic -- 4.3 Latency Overhead -- 5 Related Work -- 6 Conclusion -- References -- Security -- Leopard: Understanding the Threat of Blockchain Domain Name Based Malware -- 1 Introduction -- 2 Background -- 3 Automatic Detection -- 3.1 Overview -- 3.2 Dataset 3.3 Features -- 4 Evaluation -- 4.1 Cross-Validation on Dtrain_val -- 4.2 Feature Analysis -- 4.3 Evaluation on Dtest -- 4.4 Evaluation on Dunknown -- 5 Discussion -- 6 Related Work -- 7 Conclusion -- References -- To Filter or Not to Filter: Measuring the Benefits of Registering in the RPKI Today -- 1Intro -- Preface -- Organization -- Contents -- Active Measurement -- Discovering the IPv6 Network Periphery -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 Edgy -- 3.2 Edgy Input -- 3.3 Limitations -- 3.4 Probing -- 4 Results -- 4.1 BGP-Informed Seed Results -- 4.2 Hitlist-Informed Seed Results -- 4.3 Edginess Metrics -- 4.4 Consolidated Results and Seed Data Comparison -- 4.5 EUI-64 Addresses -- 4.6 Comparison to the IPv6 Hitlist Service -- 4.7 Comparison with CAIDA IPv6 Topology Mapping -- 4.8 Comparison with Seed Data Source -- 5 Conclusions and Future Work B Block Usage Change -- C Comparing Trinocular and FBS -- References -- FLOWTRACE: A Framework for Active Bandwidth Measurements Using In-band Packet Trains -- 1 Introduction -- 2 Background -- 3 FLOWTRACE -- 3.1 Overview -- 3.2 Technical Challenges -- 3.3 Implementation -- 4 Evaluation -- 4.1 Minimal Cross Traffic -- 4.2 With Cross-Traffic -- 4.3 Latency Overhead -- 5 Related Work -- 6 Conclusion -- References -- Security -- Leopard: Understanding the Threat of Blockchain Domain Name Based Malware -- 1 Introduction -- 2 Background -- 3 Automatic Detection -- 3.1 Overview -- 3.2 Dataset 3.3 Features -- 4 Evaluation -- 4.1 Cross-Validation on Dtrain_val -- 4.2 Feature Analysis -- 4.3 Evaluation on Dtest -- 4.4 Evaluation on Dunknown -- 5 Discussion -- 6 Related Work -- 7 Conclusion -- References -- To Filter or Not to Filter: Measuring the Benefits of Registering in the RPKI Today -- 1 Introduction -- 2 Background and Datasets -- 2.1 Related Work -- 2.2 RPKI and BGP Datasets -- 2.3 Preprocessing -- 3 To Filter or Not to Filter: Longitudinal Study -- 3.1 Detecting Filtering -- 3.2 Filtering Networks: Longitudinal Trends and Current Status -- 3.3 A Closer Look at Filtering Networks 4 RPKI to the Rescue: Conflicting Announcements -- 4.1 Tracking Visibility in the Global Routing Table -- 4.2 Conflicting Prefix Announcement Scenarios -- 4.3 Visibility of Multiple Origin as (MOAS) Prefixes -- 4.4 Visibility of Subprefix Announcements -- 5 Discussion and Conclusion -- References -- A First Look at the Misuse and Abuse of the IPv4 Transfer Market -- 1 Introduction -- 2 Background and Related Work -- 2.1 IP Transfer Market -- 2.2 Malicious Internet Activities -- 3 Datasets and Methodology -- 3.1 Processing of IPv4 Transfers -- 3.2 Detection of Malicious IPs and ASes … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (330 pages)
- Subjects:
- 004.6
Computer networks -- Management -- Congresses
Internet -- Management -- Congresses
Software measurement -- Congresses
Computer networks -- Management
Internet -- Management
Software measurement
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030440817
3030440818 - Related ISBNs:
- 9783030440800
- Notes:
- Note: References-Improving Coverage of Internet Outage Detection in Sparse Blocks-1 Introduction-2 Challenges to Broad Coverage-2.1 Problem: Sparse Blocks-2.2 Problem: Lone Addresses-3 Improving Outage Detection-3.1 Full Block Scanning for Sparse Blocks-3.2 Lone-Address-Block Recovery-4 Evaluation-4.1 Full Block Scanning Reduces Noise-4.2 How Often Does FBS and LABR Change Outages?-4.3 Comparing FBS Active and Passive Outages-4.4 FBS Effects on Temporal Precision-4.5 Increasing Coverage-5 Related Work-6 Conclusions-A Other Block Examples
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.497373
- Ingest File:
- 03_064.xml